PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd584b91a7d28, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff807344915e9, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 6827
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 19858
Key : Analysis.Init.CPU.mSec
Value: 921
Key : Analysis.Init.Elapsed.mSec
Value: 18295
Key : Analysis.Memory.CommitPeak.Mb
Value: 95
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 122821-9468-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffd584b91a7d28
BUGCHECK_P2: 0
BUGCHECK_P3: fffff807344915e9
BUGCHECK_P4: 2
READ_ADDRESS: fffff80734f05450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd584b91a7d28
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffc8de1396e30 -- (.trap 0xfffffc8de1396e30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffc8de1396ff0 rbx=0000000000000000 rcx=fffffc8de1397000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807344915e9 rsp=fffffc8de1396fc0 rbp=fffffc8de1397030
r8=fffffffffffffff0 r9=fffffc8de1397020 r10=fffff80734491590
r11=ffff6ff878c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExfAcquirePushLockExclusiveEx+0x39:
fffff807`344915e9 488b3e mov rdi,qword ptr [rsi] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffffc8d`e1396b88 fffff807`346b1259 : 00000000`00000050 ffffd584`b91a7d28 00000000`00000000 fffffc8d`e1396e30 : nt!KeBugCheckEx
fffffc8d`e1396b90 fffff807`345277e6 : fffff807`3456e110 00000000`00000000 fffffc8d`e1396d90 00000000`00000000 : nt!MiSystemFault+0x1c8ad9
fffffc8d`e1396c90 fffff807`346245f5 : 00000000`00401802 fffff807`344f3b14 00000000`00000000 00000038`f3c64004 : nt!MmAccessFault+0x2a6
fffffc8d`e1396e30 fffff807`344915e9 : 00000000`00000000 ffffd586`00000000 ffffd586`c7944e00 00000000`00000002 : nt!KiPageFault+0x335
fffffc8d`e1396fc0 fffff807`3449159e : 00000000`00000000 ffffd584`b91a7d28 00000000`00000000 00000000`00000000 : nt!ExfAcquirePushLockExclusiveEx+0x39
fffffc8d`e1397070 fffff807`38062524 : 00000000`00000706 00000000`00000000 ffffd586`c8bcac70 ffffd586`b9d24950 : nt!ExfAcquirePushLockExclusive+0xe
fffffc8d`e13970a0 fffff807`3806c739 : 01000000`00000000 ffffd586`c7944e20 ffffd586`c8328d00 ffffe786`30fe75a0 : fileinfo!FILockExclusiveAcquire+0x24
fffffc8d`e13970d0 fffff807`374033fd : ffffd586`c8bcac70 ffffd586`c8328d88 ffffffff`ffffffff ffffe786`30fe75a0 : fileinfo!FIStreamCleanup+0x49
fffffc8d`e1397130 fffff807`3743c53c : ffffd586`c8328d88 00000000`00000000 ffffe786`3062aaf8 ffffd586`c8328d88 : FLTMGR!DoReleaseContext+0x8d
fffffc8d`e1397170 fffff807`3743c037 : ffffd586`c8328d40 00000000`00000705 ffffd586`c8328d48 fffff807`3452fff6 : FLTMGR!FltpDeleteContextList+0xbc
fffffc8d`e13971a0 fffff807`3743b20a : ffffd586`c8328d40 ffffd586`b91542c0 ffffd586`c8328d40 ffffd586`c8328d40 : FLTMGR!CleanupStreamListCtrl+0x47
fffffc8d`e1397220 fffff807`348f8520 : ffffe786`30fe7738 ffffd586`c8328d48 ffffe786`30fe7738 00000000`00000705 : FLTMGR!DeleteStreamListCtrlCallback+0xba
fffffc8d`e1397260 fffff807`38216d2a : ffffe786`30fe7700 fffffc8d`e13973a8 fffffc8d`e1397720 ffffe786`30fe75a0 : nt!FsRtlTeardownPerStreamContexts+0xc0
fffffc8d`e13972a0 fffff807`38217645 : ffffe786`30fe75e0 005a0050`00000000 00000001`01000000 00000000`00000000 : Ntfs!NtfsDeleteScb+0x16a
fffffc8d`e1397340 fffff807`380f072d : ffffe786`30fe7700 ffffe786`30fe7700 ffffe786`30fe75a0 ffffe786`30fe7700 : Ntfs!NtfsRemoveScb+0xad
fffffc8d`e13973a0 fffff807`3821739f : fffffc8d`e1397720 ffffd586`b91642a0 ffffe786`30fe75a0 ffffe786`30fe7a00 : Ntfs!NtfsPrepareFcbForRemoval+0x5d
fffffc8d`e13973e0 fffff807`380f0440 : fffffc8d`e1397720 fffffc8d`e13974e2 ffffe786`30fe7a00 00000000`00000000 : Ntfs!NtfsTeardownStructures+0x9f
fffffc8d`e1397460 fffff807`382162a9 : fffffc8d`e1397600 fffffc8d`e1397618 00000000`00000000 fffffc8d`e1397600 : Ntfs!NtfsDecrementCloseCounts+0xb0
fffffc8d`e13974a0 fffff807`38215c02 : fffffc8d`e1397720 ffffe786`30fe7700 ffffe786`30fe75a0 ffffd586`b91621b0 : Ntfs!NtfsCommonClose+0x469
fffffc8d`e1397580 fffff807`3822fcd6 : 00000000`00000000 ffffd586`b91621b0 ffffd586`b91642a0 ffffd586`af8a9730 : Ntfs!NtfsFspCloseInternal+0x252
fffffc8d`e13976e0 fffff807`3451d10f : ffffd586`af8a9730 ffffd586`c9b1e000 ffffd586`00000000 ffffd586`00000000 : Ntfs!NtfsFspClose+0x86
fffffc8d`e13979c0 fffff807`344478f5 : ffffd586`c9b1e040 ffff8000`8b320000 ffffd586`c9b1e040 004fe067`b4bbbdff : nt!ExpWorkerThread+0x14f
fffffc8d`e1397bb0 fffff807`34619a74 : ffff8000`8b310180 ffffd586`c9b1e040 fffff807`344478a0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffc8d`e1397c00 00000000`00000000 : fffffc8d`e1398000 fffffc8d`e1391000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: fileinfo!FILockExclusiveAcquire+24
MODULE_NAME: fileinfo
IMAGE_NAME: fileinfo.sys
IMAGE_VERSION: 10.0.21390.1
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 24
FAILURE_BUCKET_ID: AV_R_(null)_fileinfo!FILockExclusiveAcquire
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b2944fd8-0991-6553-d7f1-14ada397b521}
Followup: MachineOwner
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80478305330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6655
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 97406
Key : Analysis.Init.CPU.mSec
Value: 859
Key : Analysis.Init.Elapsed.mSec
Value: 45258
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 100621-8765-01.dmp
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80478305330
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff80474950b20 -- (.trap 0xfffff80474950b20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff9402b5fb4202
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8047785c83b rsp=fffff80474950cb0 rbp=000000000010a590
r8=0000000000000001 r9=000000000010a590 r10=ffff9402b2f78000
r11=000000000000000e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KzLowerIrql+0x1b:
fffff804`7785c83b 4883c420 add rsp,20h
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: DAZStudio.exe
STACK_TEXT:
fffff804`74958dd8 fffff804`778ebd7f : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`78305330 : nt!KeBugCheckEx
fffff804`74958de0 fffff804`778eb991 : 000042e6`522a7072 fffff804`00000500 00000000`00000002 fffff804`778e71ee : nt!KeAccumulateTicks+0x20f
fffff804`74958e50 fffff804`778e9b7a : fffff804`745d6200 fffff804`74950b20 fffff804`745d62c0 00000000`00000450 : nt!KiUpdateRunTime+0x61
fffff804`74958eb0 fffff804`778e9966 : fffff804`782f7bd0 fffff804`782f7c80 ffffa701`00000000 fffff804`74958fc0 : nt!KeClockInterruptNotify+0x11a
fffff804`74958f40 fffff804`7790dc40 : 00000000`0000000c ffff1b21`3df30f9f 00000000`00000000 fffff804`77a1451b : nt!HalpTimerClockIpiRoutine+0x16
fffff804`74958f70 fffff804`77a1477a : fffff804`74950ba0 fffff804`782f7bd0 000042e6`51357266 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa0
fffff804`74958fb0 fffff804`77a14d47 : fffff804`74950bb8 fffff804`749511f8 00000000`00000001 fffff804`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`74950b20 fffff804`7785c83b : 00000000`00000000 fffff804`8ba879f7 ffff9402`b2f78000 ffff9402`b0859010 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`74950cb0 fffff804`8b67a42f : ffff9402`b2f78000 fffff804`74950d00 ffff9402`b2f791d0 fffff804`8b67a42f : nt!KzLowerIrql+0x1b
fffff804`74950ce0 ffff9402`b2f78000 : fffff804`74950d00 ffff9402`b2f791d0 fffff804`8b67a42f ffff9402`b2f791d0 : nvlddmkm+0x10a42f
fffff804`74950ce8 fffff804`74950d00 : ffff9402`b2f791d0 fffff804`8b67a42f ffff9402`b2f791d0 fffff804`8ba86d5e : 0xffff9402`b2f78000
fffff804`74950cf0 ffff9402`b2f791d0 : fffff804`8b67a42f ffff9402`b2f791d0 fffff804`8ba86d5e 00000000`00000000 : 0xfffff804`74950d00
fffff804`74950cf8 fffff804`8b67a42f : ffff9402`b2f791d0 fffff804`8ba86d5e 00000000`00000000 00000000`00000000 : 0xffff9402`b2f791d0
fffff804`74950d00 ffff9402`b2f791d0 : fffff804`8ba86d5e 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x10a42f
fffff804`74950d08 fffff804`8ba86d5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff9402`b2f791d0
fffff804`74950d10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x516d5e
SYMBOL_NAME: nvlddmkm+10a42f
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 10a42f
FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup: MachineOwner
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffffbc0744c00140, Address of the heap that reported the corruption
Arg3: ffffbc074f5c0000, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5905
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 49163
Key : Analysis.Init.CPU.mSec
Value: 984
Key : Analysis.Init.Elapsed.mSec
Value: 11124
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 122821-9125-01.dmp
BUGCHECK_CODE: 13a
BUGCHECK_P1: 12
BUGCHECK_P2: ffffbc0744c00140
BUGCHECK_P3: ffffbc074f5c0000
BUGCHECK_P4: 0
CORRUPTING_POOL_ADDRESS: fffff80354905450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffbc074f5c0000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
STACK_TEXT:
ffffef87`bde6eb38 fffff803`541edb34 : 00000000`0000013a 00000000`00000012 ffffbc07`44c00140 ffffbc07`4f5c0000 : nt!KeBugCheckEx
ffffef87`bde6eb40 fffff803`541edb94 : 00000000`00000012 ffffbc07`44c002c0 ffffbc07`44c00140 00000000`00020000 : nt!RtlpHeapHandleError+0x40
ffffef87`bde6eb80 fffff803`541ed7c1 : ffffbc07`4f60dc98 ffffbc07`4f60dc90 00000000`00250000 ffffbc07`4f57ac90 : nt!RtlpHpHeapHandleError+0x58
ffffef87`bde6ebb0 fffff803`540b7eb7 : 00000011`00000000 00000000`4f57aed0 00010011`00720001 00000000`00000011 : nt!RtlpLogHeapFailure+0x45
ffffef87`bde6ebe0 fffff803`53efaaf5 : 00000000`00000024 00000000`00000230 00000000`00000025 00000000`00000000 : nt!RtlpHpVsContextAllocateInternal+0x1bc787
ffffef87`bde6ec50 fffff803`53f0103c : fffff803`5485ea40 ffffef87`bde6eda1 ffffde08`00000001 ffffde08`400123c0 : nt!RtlpHpVsContextMultiAlloc+0x69
ffffef87`bde6ecd0 fffff803`53f004ff : 00000000`000006c3 00000000`00000001 00000000`31306956 00000000`00000000 : nt!ExAllocateHeapPool+0xaec
ffffef87`bde6ee00 fffff803`5466b4ed : 00000000`00000100 00000000`00000001 00000000`00000401 ffffef87`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffef87`bde6ee50 fffff803`69e02e10 : 00000000`00000001 00000000`00000000 00000000`00000001 ffff360b`6567274e : nt!ExAllocatePool2+0xcd
ffffef87`bde6ef00 fffff803`69e8fed4 : ffffef87`bde6f0b0 fffff803`00000000 00000000`00000000 ffffef87`bde6f034 : dxgmms2!operator new+0x1c
ffffef87`bde6ef30 fffff803`69ea449f : ffffde08`53669000 ffffde08`4fb96480 ffffde08`50733000 00000000`00020000 : dxgmms2!VIDMM_GLOBAL::CreateOneAllocation+0x1314
ffffef87`bde6f130 fffff803`69e170a3 : ffffde08`574a8080 00000000`00000000 00000000`00000000 ffffef87`bde6f2e8 : dxgmms2!VIDMM_GLOBAL::CreateAllocation+0xbb
ffffef87`bde6f1f0 fffff803`65f87f23 : 00000000`00020000 ffffef87`bde6f389 00000000`00000000 ffffbc07`4ef1d010 : dxgmms2!VidMmCreateAllocation+0xa3
ffffef87`bde6f2b0 fffff803`65f8589c : ffffbc07`4ef1d010 ffffef87`bde6f8b0 ffffbc07`487dc7a0 ffffbc07`487dca70 : dxgkrnl!DXGDEVICE::CreateVidMmAllocations+0x213
ffffef87`bde6f3d0 fffff803`65f80dd5 : ffffffff`ffffffff ffffef87`bde6fb20 00000000`00000000 ffffde08`53552000 : dxgkrnl!DXGDEVICE::CreateAllocation+0x151c
ffffef87`bde6f7d0 fffff803`65faddfb : 00000000`000035c0 00000000`00000001 ffffde08`574a8080 00000000`00000001 : dxgkrnl!DxgkCreateAllocationInternal+0x5d5
ffffef87`bde6fa70 fffff803`54027f78 : 00000000`0a9b8e00 ffffef87`bde6fb20 00000000`0eb390c0 00000000`00000020 : dxgkrnl!DxgkCreateAllocation+0xb
ffffef87`bde6faa0 00007ffe`21974af4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`00a5baf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`21974af4
SYMBOL_NAME: dxgmms2!operator new+1c
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.22000.376
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c
FAILURE_BUCKET_ID: 0x13a_12_dxgmms2!operator_new
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {eebb0849-c2a0-1efa-dffc-6d6d8630ca60}
Followup: MachineOwner
Bios dan overclock ayarlarını kapattım henüz hata almadım. Sanırım psu yetersiz kalıyordu(750W).Öncelikle size ilk önerim DDU yazılımı ile temizledikten sonra güncel grafik driverınızı kurmanız. Kuracağınız sürücünün, işletim sisteminizde uyumlu olduğundan emin olun.
DDU : DDU ile Sürücü Kaldırma Rehberi
Sonrasında aşağıdaki rehberi uygulayın.
Rehber : Rehber: Eksik ve bozuk SYS dosyalarını onarmak
Geçici olarak Kaspersky yazılımını da kaldırmanızı öneriyorum. Raporda modül hataları mevcut.
Sonrasında bir süre gözlemleyin. Eğer yeni hata alırsanız güncel minidump dosyalarını tekrar paylaşırsınız, inceleriz.
Umarım sorununuz çözülür.
Kod:PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffd584b91a7d28, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff807344915e9, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : AV.Type Value: Read Key : Analysis.CPU.mSec Value: 6827 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 19858 Key : Analysis.Init.CPU.mSec Value: 921 Key : Analysis.Init.Elapsed.mSec Value: 18295 Key : Analysis.Memory.CommitPeak.Mb Value: 95 Key : WER.OS.Branch Value: co_release Key : WER.OS.Timestamp Value: 2021-06-04T16:28:00Z Key : WER.OS.Version Value: 10.0.22000.1 FILE_IN_CAB: 122821-9468-01.dmp BUGCHECK_CODE: 50 BUGCHECK_P1: ffffd584b91a7d28 BUGCHECK_P2: 0 BUGCHECK_P3: fffff807344915e9 BUGCHECK_P4: 2 READ_ADDRESS: fffff80734f05450: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse ffffd584b91a7d28 MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffffc8de1396e30 -- (.trap 0xfffffc8de1396e30) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffc8de1396ff0 rbx=0000000000000000 rcx=fffffc8de1397000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff807344915e9 rsp=fffffc8de1396fc0 rbp=fffffc8de1397030 r8=fffffffffffffff0 r9=fffffc8de1397020 r10=fffff80734491590 r11=ffff6ff878c00000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!ExfAcquirePushLockExclusiveEx+0x39: fffff807`344915e9 488b3e mov rdi,qword ptr [rsi] ds:00000000`00000000=???????????????? Resetting default scope STACK_TEXT: fffffc8d`e1396b88 fffff807`346b1259 : 00000000`00000050 ffffd584`b91a7d28 00000000`00000000 fffffc8d`e1396e30 : nt!KeBugCheckEx fffffc8d`e1396b90 fffff807`345277e6 : fffff807`3456e110 00000000`00000000 fffffc8d`e1396d90 00000000`00000000 : nt!MiSystemFault+0x1c8ad9 fffffc8d`e1396c90 fffff807`346245f5 : 00000000`00401802 fffff807`344f3b14 00000000`00000000 00000038`f3c64004 : nt!MmAccessFault+0x2a6 fffffc8d`e1396e30 fffff807`344915e9 : 00000000`00000000 ffffd586`00000000 ffffd586`c7944e00 00000000`00000002 : nt!KiPageFault+0x335 fffffc8d`e1396fc0 fffff807`3449159e : 00000000`00000000 ffffd584`b91a7d28 00000000`00000000 00000000`00000000 : nt!ExfAcquirePushLockExclusiveEx+0x39 fffffc8d`e1397070 fffff807`38062524 : 00000000`00000706 00000000`00000000 ffffd586`c8bcac70 ffffd586`b9d24950 : nt!ExfAcquirePushLockExclusive+0xe fffffc8d`e13970a0 fffff807`3806c739 : 01000000`00000000 ffffd586`c7944e20 ffffd586`c8328d00 ffffe786`30fe75a0 : fileinfo!FILockExclusiveAcquire+0x24 fffffc8d`e13970d0 fffff807`374033fd : ffffd586`c8bcac70 ffffd586`c8328d88 ffffffff`ffffffff ffffe786`30fe75a0 : fileinfo!FIStreamCleanup+0x49 fffffc8d`e1397130 fffff807`3743c53c : ffffd586`c8328d88 00000000`00000000 ffffe786`3062aaf8 ffffd586`c8328d88 : FLTMGR!DoReleaseContext+0x8d fffffc8d`e1397170 fffff807`3743c037 : ffffd586`c8328d40 00000000`00000705 ffffd586`c8328d48 fffff807`3452fff6 : FLTMGR!FltpDeleteContextList+0xbc fffffc8d`e13971a0 fffff807`3743b20a : ffffd586`c8328d40 ffffd586`b91542c0 ffffd586`c8328d40 ffffd586`c8328d40 : FLTMGR!CleanupStreamListCtrl+0x47 fffffc8d`e1397220 fffff807`348f8520 : ffffe786`30fe7738 ffffd586`c8328d48 ffffe786`30fe7738 00000000`00000705 : FLTMGR!DeleteStreamListCtrlCallback+0xba fffffc8d`e1397260 fffff807`38216d2a : ffffe786`30fe7700 fffffc8d`e13973a8 fffffc8d`e1397720 ffffe786`30fe75a0 : nt!FsRtlTeardownPerStreamContexts+0xc0 fffffc8d`e13972a0 fffff807`38217645 : ffffe786`30fe75e0 005a0050`00000000 00000001`01000000 00000000`00000000 : Ntfs!NtfsDeleteScb+0x16a fffffc8d`e1397340 fffff807`380f072d : ffffe786`30fe7700 ffffe786`30fe7700 ffffe786`30fe75a0 ffffe786`30fe7700 : Ntfs!NtfsRemoveScb+0xad fffffc8d`e13973a0 fffff807`3821739f : fffffc8d`e1397720 ffffd586`b91642a0 ffffe786`30fe75a0 ffffe786`30fe7a00 : Ntfs!NtfsPrepareFcbForRemoval+0x5d fffffc8d`e13973e0 fffff807`380f0440 : fffffc8d`e1397720 fffffc8d`e13974e2 ffffe786`30fe7a00 00000000`00000000 : Ntfs!NtfsTeardownStructures+0x9f fffffc8d`e1397460 fffff807`382162a9 : fffffc8d`e1397600 fffffc8d`e1397618 00000000`00000000 fffffc8d`e1397600 : Ntfs!NtfsDecrementCloseCounts+0xb0 fffffc8d`e13974a0 fffff807`38215c02 : fffffc8d`e1397720 ffffe786`30fe7700 ffffe786`30fe75a0 ffffd586`b91621b0 : Ntfs!NtfsCommonClose+0x469 fffffc8d`e1397580 fffff807`3822fcd6 : 00000000`00000000 ffffd586`b91621b0 ffffd586`b91642a0 ffffd586`af8a9730 : Ntfs!NtfsFspCloseInternal+0x252 fffffc8d`e13976e0 fffff807`3451d10f : ffffd586`af8a9730 ffffd586`c9b1e000 ffffd586`00000000 ffffd586`00000000 : Ntfs!NtfsFspClose+0x86 fffffc8d`e13979c0 fffff807`344478f5 : ffffd586`c9b1e040 ffff8000`8b320000 ffffd586`c9b1e040 004fe067`b4bbbdff : nt!ExpWorkerThread+0x14f fffffc8d`e1397bb0 fffff807`34619a74 : ffff8000`8b310180 ffffd586`c9b1e040 fffff807`344478a0 00000000`00000000 : nt!PspSystemThreadStartup+0x55 fffffc8d`e1397c00 00000000`00000000 : fffffc8d`e1398000 fffffc8d`e1391000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34 SYMBOL_NAME: fileinfo!FILockExclusiveAcquire+24 MODULE_NAME: fileinfo IMAGE_NAME: fileinfo.sys IMAGE_VERSION: 10.0.21390.1 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 24 FAILURE_BUCKET_ID: AV_R_(null)_fileinfo!FILockExclusiveAcquire OS_VERSION: 10.0.22000.1 BUILDLAB_STR: co_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {b2944fd8-0991-6553-d7f1-14ada397b521} Followup: MachineOwner
Kod:DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff80478305330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6655 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 97406 Key : Analysis.Init.CPU.mSec Value: 859 Key : Analysis.Init.Elapsed.mSec Value: 45258 Key : Analysis.Memory.CommitPeak.Mb Value: 78 Key : WER.OS.Branch Value: co_release Key : WER.OS.Timestamp Value: 2021-06-04T16:28:00Z Key : WER.OS.Version Value: 10.0.22000.1 FILE_IN_CAB: 100621-8765-01.dmp BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff80478305330 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED TRAP_FRAME: fffff80474950b20 -- (.trap 0xfffff80474950b20) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffff9402b5fb4202 rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8047785c83b rsp=fffff80474950cb0 rbp=000000000010a590 r8=0000000000000001 r9=000000000010a590 r10=ffff9402b2f78000 r11=000000000000000e r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!KzLowerIrql+0x1b: fffff804`7785c83b 4883c420 add rsp,20h Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: DAZStudio.exe STACK_TEXT: fffff804`74958dd8 fffff804`778ebd7f : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`78305330 : nt!KeBugCheckEx fffff804`74958de0 fffff804`778eb991 : 000042e6`522a7072 fffff804`00000500 00000000`00000002 fffff804`778e71ee : nt!KeAccumulateTicks+0x20f fffff804`74958e50 fffff804`778e9b7a : fffff804`745d6200 fffff804`74950b20 fffff804`745d62c0 00000000`00000450 : nt!KiUpdateRunTime+0x61 fffff804`74958eb0 fffff804`778e9966 : fffff804`782f7bd0 fffff804`782f7c80 ffffa701`00000000 fffff804`74958fc0 : nt!KeClockInterruptNotify+0x11a fffff804`74958f40 fffff804`7790dc40 : 00000000`0000000c ffff1b21`3df30f9f 00000000`00000000 fffff804`77a1451b : nt!HalpTimerClockIpiRoutine+0x16 fffff804`74958f70 fffff804`77a1477a : fffff804`74950ba0 fffff804`782f7bd0 000042e6`51357266 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa0 fffff804`74958fb0 fffff804`77a14d47 : fffff804`74950bb8 fffff804`749511f8 00000000`00000001 fffff804`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa fffff804`74950b20 fffff804`7785c83b : 00000000`00000000 fffff804`8ba879f7 ffff9402`b2f78000 ffff9402`b0859010 : nt!KiInterruptDispatchNoLockNoEtw+0x37 fffff804`74950cb0 fffff804`8b67a42f : ffff9402`b2f78000 fffff804`74950d00 ffff9402`b2f791d0 fffff804`8b67a42f : nt!KzLowerIrql+0x1b fffff804`74950ce0 ffff9402`b2f78000 : fffff804`74950d00 ffff9402`b2f791d0 fffff804`8b67a42f ffff9402`b2f791d0 : nvlddmkm+0x10a42f fffff804`74950ce8 fffff804`74950d00 : ffff9402`b2f791d0 fffff804`8b67a42f ffff9402`b2f791d0 fffff804`8ba86d5e : 0xffff9402`b2f78000 fffff804`74950cf0 ffff9402`b2f791d0 : fffff804`8b67a42f ffff9402`b2f791d0 fffff804`8ba86d5e 00000000`00000000 : 0xfffff804`74950d00 fffff804`74950cf8 fffff804`8b67a42f : ffff9402`b2f791d0 fffff804`8ba86d5e 00000000`00000000 00000000`00000000 : 0xffff9402`b2f791d0 fffff804`74950d00 ffff9402`b2f791d0 : fffff804`8ba86d5e 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x10a42f fffff804`74950d08 fffff804`8ba86d5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff9402`b2f791d0 fffff804`74950d10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x516d5e SYMBOL_NAME: nvlddmkm+10a42f MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 10a42f FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function OS_VERSION: 10.0.22000.1 BUILDLAB_STR: co_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86} Followup: MachineOwner
Kod:KERNEL_MODE_HEAP_CORRUPTION (13a) The kernel mode heap manager has detected corruption in a heap. Arguments: Arg1: 0000000000000012, Type of corruption detected Arg2: ffffbc0744c00140, Address of the heap that reported the corruption Arg3: ffffbc074f5c0000, Address at which the corruption was detected Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5905 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 49163 Key : Analysis.Init.CPU.mSec Value: 984 Key : Analysis.Init.Elapsed.mSec Value: 11124 Key : Analysis.Memory.CommitPeak.Mb Value: 88 Key : WER.OS.Branch Value: co_release Key : WER.OS.Timestamp Value: 2021-06-04T16:28:00Z Key : WER.OS.Version Value: 10.0.22000.1 FILE_IN_CAB: 122821-9125-01.dmp BUGCHECK_CODE: 13a BUGCHECK_P1: 12 BUGCHECK_P2: ffffbc0744c00140 BUGCHECK_P3: ffffbc074f5c0000 BUGCHECK_P4: 0 CORRUPTING_POOL_ADDRESS: fffff80354905450: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse ffffbc074f5c0000 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: explorer.exe STACK_TEXT: ffffef87`bde6eb38 fffff803`541edb34 : 00000000`0000013a 00000000`00000012 ffffbc07`44c00140 ffffbc07`4f5c0000 : nt!KeBugCheckEx ffffef87`bde6eb40 fffff803`541edb94 : 00000000`00000012 ffffbc07`44c002c0 ffffbc07`44c00140 00000000`00020000 : nt!RtlpHeapHandleError+0x40 ffffef87`bde6eb80 fffff803`541ed7c1 : ffffbc07`4f60dc98 ffffbc07`4f60dc90 00000000`00250000 ffffbc07`4f57ac90 : nt!RtlpHpHeapHandleError+0x58 ffffef87`bde6ebb0 fffff803`540b7eb7 : 00000011`00000000 00000000`4f57aed0 00010011`00720001 00000000`00000011 : nt!RtlpLogHeapFailure+0x45 ffffef87`bde6ebe0 fffff803`53efaaf5 : 00000000`00000024 00000000`00000230 00000000`00000025 00000000`00000000 : nt!RtlpHpVsContextAllocateInternal+0x1bc787 ffffef87`bde6ec50 fffff803`53f0103c : fffff803`5485ea40 ffffef87`bde6eda1 ffffde08`00000001 ffffde08`400123c0 : nt!RtlpHpVsContextMultiAlloc+0x69 ffffef87`bde6ecd0 fffff803`53f004ff : 00000000`000006c3 00000000`00000001 00000000`31306956 00000000`00000000 : nt!ExAllocateHeapPool+0xaec ffffef87`bde6ee00 fffff803`5466b4ed : 00000000`00000100 00000000`00000001 00000000`00000401 ffffef87`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f ffffef87`bde6ee50 fffff803`69e02e10 : 00000000`00000001 00000000`00000000 00000000`00000001 ffff360b`6567274e : nt!ExAllocatePool2+0xcd ffffef87`bde6ef00 fffff803`69e8fed4 : ffffef87`bde6f0b0 fffff803`00000000 00000000`00000000 ffffef87`bde6f034 : dxgmms2!operator new+0x1c ffffef87`bde6ef30 fffff803`69ea449f : ffffde08`53669000 ffffde08`4fb96480 ffffde08`50733000 00000000`00020000 : dxgmms2!VIDMM_GLOBAL::CreateOneAllocation+0x1314 ffffef87`bde6f130 fffff803`69e170a3 : ffffde08`574a8080 00000000`00000000 00000000`00000000 ffffef87`bde6f2e8 : dxgmms2!VIDMM_GLOBAL::CreateAllocation+0xbb ffffef87`bde6f1f0 fffff803`65f87f23 : 00000000`00020000 ffffef87`bde6f389 00000000`00000000 ffffbc07`4ef1d010 : dxgmms2!VidMmCreateAllocation+0xa3 ffffef87`bde6f2b0 fffff803`65f8589c : ffffbc07`4ef1d010 ffffef87`bde6f8b0 ffffbc07`487dc7a0 ffffbc07`487dca70 : dxgkrnl!DXGDEVICE::CreateVidMmAllocations+0x213 ffffef87`bde6f3d0 fffff803`65f80dd5 : ffffffff`ffffffff ffffef87`bde6fb20 00000000`00000000 ffffde08`53552000 : dxgkrnl!DXGDEVICE::CreateAllocation+0x151c ffffef87`bde6f7d0 fffff803`65faddfb : 00000000`000035c0 00000000`00000001 ffffde08`574a8080 00000000`00000001 : dxgkrnl!DxgkCreateAllocationInternal+0x5d5 ffffef87`bde6fa70 fffff803`54027f78 : 00000000`0a9b8e00 ffffef87`bde6fb20 00000000`0eb390c0 00000000`00000020 : dxgkrnl!DxgkCreateAllocation+0xb ffffef87`bde6faa0 00007ffe`21974af4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`00a5baf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`21974af4 SYMBOL_NAME: dxgmms2!operator new+1c MODULE_NAME: dxgmms2 IMAGE_NAME: dxgmms2.sys IMAGE_VERSION: 10.0.22000.376 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 1c FAILURE_BUCKET_ID: 0x13a_12_dxgmms2!operator_new OS_VERSION: 10.0.22000.1 BUILDLAB_STR: co_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {eebb0849-c2a0-1efa-dffc-6d6d8630ca60} Followup: MachineOwner
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.